Hi,
I have a question regarding required mitigation measures against spectre / meltdown / ... on different levels, i.e. what is needed where.
As I understand it, already the host OS - Debian contains mitigations according to lscpu output:
In addition there's the possibility to configure spectre / meltdown migitation measures in the VM-CPU configuration of Proxmox.
If everything is activated this is likely redundant and comes with significant waste of resources?
How is it with LXC containers, I reckon host mitigations are enough?
Thanks for insights.
I have a question regarding required mitigation measures against spectre / meltdown / ... on different levels, i.e. what is needed where.
As I understand it, already the host OS - Debian contains mitigations according to lscpu output:
Code:
Vulnerability Itlb multihit: Not affected
Vulnerability L1tf: Not affected
Vulnerability Mds: Not affected
Vulnerability Meltdown: Not affected
Vulnerability Spec store bypass: Mitigation; Speculative Store Bypass disabled via prctl and seccomp
Vulnerability Spectre v1: Mitigation; usercopy/swapgs barriers and __user pointer sanitization
Vulnerability Spectre v2: Mitigation; Enhanced IBRS, IBPB conditional, RSB filling
Vulnerability Srbds: Not affected
Vulnerability Tsx async abort: Not affected
In addition there's the possibility to configure spectre / meltdown migitation measures in the VM-CPU configuration of Proxmox.
- Is this in addition to the mitigation measures already present on the host required?
- Why and which ones?
- I guess this is not required and redundant, correct?
- Or is it that due to virtualization that the virtual CPU itself is affected by spectre even if the host CPU mitigates it already?
If everything is activated this is likely redundant and comes with significant waste of resources?
How is it with LXC containers, I reckon host mitigations are enough?
Thanks for insights.